Is Your Office or Phone Bugged

More and more each day competitors, ex-associates, new start-up ventures, and unscrupulous individuals are using electronic eavesdropping as a way to gather information that could seriously damage your business.

"Bugs" telephone taps and video transmitters (above) are readily available that can compromise your business secrets for as little as $30.00. The manufacture, sale, installation, and monitoring of these devices is a multi-billion dollar industry in North America.
Unless you are a law enforcement agency with an Order or Warrant for a wire tap, it is a criminal offence to record the conversations of two or more persons without their consent

How Do You Know If You're Bugged ?

Confidential information seems to be getting out to competitors.

Competitors seem to be just one step ahead all of the time.

Your office was broken into yet very little or nothing was taken.

Sockets or switches show signs of being moved slightly, ie: the wallpaper may be disturbed.

Indications that your handset may have been exchanged, ie: numbers in memory may be lost.

Repairers or utility companies turn up to carry out work when they have not been called.

Furniture or items appear to have been disturbed.

Interference on your radio or television.

Unexplained brick or plaster dust on floor

Kevin Bousquet Looking & Listening for RF Devices

The RF Sweep & Spectrum Analysis

The most commonly and widely used of all the devices is the RF (Radio Frequency) transmitter bug. These devices are inexpensive easy to use and require no specialized receiving equipment a simple AM or FM radio can be used to monitor the bug. Due to their low cost, there is very little incentive to recover these devices once planted.

The Spectrum Analysis (photo above) we use to detect RF devices is capable of monitoring frequencies up to 36 Gigaherts. This will also include very low frequency (VLF) devices which transmit on frequencies down to 15 Kilohertz.

Sam Labella Listening for Devices through the Power Lines

Power Line Analysis - Hard Wire Bugs

The next method is often known as the "wire tap" or a "hard wire bug". The wiretap will use any existing wiring in the home or office ie: the electrical plugs (see photo above), alarm systems or even the telephone wiring. This is similar a typical baby monitor situation where you plug the transmitter into one room and the receiver in the other.

Many think that telephones are only a security risk when being used but a simple modification to the handset can leave the microphone connected, even when the phone is not in use.